2025 Call for Papers

Call for Paper

International Conference on

Collaboration in Cybersecurity and Digital Transformation

https://e-cysa.org/conference/ 

6-7 February 2025

 

Theme: Cybersecurity, Collaboration, and Project Management 

Dates: 6-7 February 2025

Venue: Addis Ababa, Ethiopia – Format: Hybrid

Submission Websitehttps://digitalcommons.kennesaw.edu/e-cysa/ 

Conference websitehttps://e-cysa.org/conference/

Organizer: Ethiopian Cybersecurity Association (ECySA)

 

 

Introduction

Digital technology is changing society and human relationships; permeating what we do and bringing digital, physical, and biological systems together. This revolution is marked by emerging technologies including robotics, artificial intelligence, nanotechnology, quantum computing, biotechnology, the Internet of Things, 3D printing, and autonomous vehicles. The impending impact is enormous; it is changing how we live, work, and communicate. It is reshaping our aspect of life.

Technology enables developing economies to leapfrog directly to the information era assisting them to build a knowledge-based economy faster. However, collaboration initiative requires careful planning, executing, and delivering a usable and sustainable solution. It requires a homegrown approach that addresses the country’s unique realities, factoring various cultural, traditional, customs, and country-specific regulatory and legal requirements. It also requires knowledge about transitioning from manual or legacy technology, project management, cybersecurity risk management, and cultural & societal dynamics.

 

Call for Papers

ECySA seeks to explore the key factors that facilitate the adoption of sustainable digital technology for tangible and sustainable economic outcomes. We invite you to participate by submitting completed or in-progress papers, position papers, panel discussion topics, and exhibition posters in the three conference themes in the context of Cybersecurity: Digital Transformation, Project Management, and Collaboration.

Digital Transformation- Effective technology management is a prerequisite for successful collaboration initiatives. Achieving collaboration goals may become wishful thinking without proper identification and implementation and adaption of implemented technologies. it is essential the project management program adapts to the local cultural norms, political aspects, and social traditions.

Cybersecurity-African countries are sprinting towards digitalization. This quest for digitization may expose the countries to more risk and vulnerability if not complemented with cybersecurity, digital governance, intellectual property (IP) protection, and data privacy protection. Failure to implement these provisions can reduce innovation, make it difficult to scale up digital solutions, and face rapidly evolving complex digital threats against critical infrastructure and state-sponsored organized crime. Countries with inadequate cybersecurity measures have a higher risk of cyberattacks.

Collaboration -Digital transformation is a huge task that needs to mobilize abundant resources and closer institutional, national, and global collaboration. Equally, efforts to secure cyberspace are complex and could hardly be ensured without close collaboration.

The conference will explore diverse stakeholder perspectives from academic, private, government, and non-government institutions. Below are a few suggested topic areas, please do not hesitate to send us papers on other related topics.

Topics in Digital Transformation and Project Management (we welcome other related topics)

  • Project management methodologies adapted for local/country use
  • Project Governance, risk, and uncertainty performance domain
  • Defining, adopting, and promoting sustainability in project and program management.
  • Capacity building.
  • Policy, standard, disciplined practice for project management
  • The management of equality and diversity issues in NGO projects and programs.
  • Knowledge transfer and retention in project environments.
  • Leveraging local knowledge in projects.
  • Establishing effective measures for monitoring and controlling projects
  • Use of Project Management Office and Portfolio management practice
  • Project leadership in adaptive projects
  • Project Management in e-service government projects
  • Use of standard project practice in digital technology transformation government projects
  • Use of Project Management in overcoming ethical/corruption, social, financial, or technical challenges
  • Applications of the Code of Ethics and Professional Conduct in delivering projects
  • Role of local universities in Project Management and R&D to improve project success
  • University Curriculum and Education in Project Management
  • Project stakeholder management including government or aid agency mandates that constrain project success.
  • Use of Project results-based accountability
  • Use of Measurable Critical success factors in projects

 

Topics in Cybersecurity(we welcome other related topics)

  • Personal data protection policies
  • Protecting Online Identity and Reputation
  • National Cybersecurity Policy, regulations, audit, and risk management
  • Organizational-level information security policy, standards, procedures
  • Data breach and cybersecurity litigation
  • Identity and trust management
  • Cybersecurity education and curriculum
  • Public key infrastructures, key management, certification
  • Cybersecurity and platforms including cryptography, digital forensics, blockchain, and distributed ledger technology
  • Cybersecurity for IoT and blockchain applications
  • Machine Learning and AI Cybersecurity Risks & Mitigations
  • Security-by-design, Cybersecurity requirements in Project Management
  • Hardware and physical security
  • Mobile/wireless/cellular system security
  • Web application (e-service, e-commerce, etc.) security
  • Threat and vulnerability management, intrusion detection and response
  • Online crime, underground economics
  • Web, online harassment, spam, and fake news/reviews
  • National Cybersecurity Awareness Program and Campaign
  • Cybersecurity Audit Program, certification, practice
  • Computer hacking, Digital Forensics
  • Crisis management, business continuity planning
  • Third-party cyber risk management

 

Topics in Collaboration in Cybersecurity

  • Best practices for information sharing
  • Building trust and collaboration
  • Leveraging threat intelligence
  • Effective models for PPPs
  • Challenges and opportunities
  • Measuring the impact of PPPs
  • Global cybersecurity frameworks
  • Addressing cross-border threats
  • Building trust and cooperation among nations
  • Building and maintaining cybersecurity communities
  • Leveraging online platforms
  • Measuring the impact of cybersecurity communities
  • Identifying research priorities
  • Funding mechanisms for collaborative research
  • Sharing research outcomes
  • Collaborative cybersecurity training programs

 

IMPORTANT DATES

6-7 Feburary 2025

Conference Days

18 October 2024

Call for Submissions

25 November 2024

Deadline for abstract, Research-in-Progress Posters, Panel Discussion Topics, and Exhibition Requests

15 December 2024

Notification of acceptance or rejection of abstract, Research-in-Progress Posters, Panel Discussion Topics, Exhibition Request

20 January 2025

Deadline for Full Paper, Research-in-Progress Posters, Panel Discussion Topics, and Exhibition Requests

25 January 2025

Notification of acceptance or rejection of Full Paper, Posters, Panel Discussion Topics, Exhibition Request

1 February 2025

Deadline for

  • Submission of Camera-ready Full Papers
  • Early-bird Registration

 

 

Leadership Council

Berhanu Beyene

Conference Chair

Alemayehu Hailu

Call for Paper Director

Solomon Negash

Managing Director

Asrat Mulatu

Conference co-Chair

Beruh HM Tadesse

Conference co-Chair

Sossina Taferi

Media Committee

Jay Jemal

Conference Committee

Rahel Fidel

Logistics Committee

Feven Dagnachew

Sponsorship Committee

Seble Girma

Program Committee

 

 

Submit Your Proposal